Concept in Definition ABC
Miscellanea / / July 04, 2021
By Guillem Alsina González, in Aug. 2016
It is a type of malware that "hijacks" our data by encrypting it and asking for a ransom to give us the decryption key.
How does it work?
The ransomware is used to infecting the computers of its victims through the email, in messages that include a file attached or a link that points to a file or a web page in which we are being persuaded to download the file that contains the pathogen.
These messages have the common nexus of using the call social engineering to make us believe that they are anything else, from programs to speed up Internet even notifications of packages that await us in emails, through programs that someone we know wants us to install.
Once installed and in functioning -and, I repeat, that for this, an explicit action by the Internet user is normally necessary- the first thing they do is encrypt all the files that they find in their path, either by type (photographs, text documents, ...) or by folders (My Documents, Images,...).
In this way, the cybercriminals behind these pathogens make sure they kidnap us our personal and professional files, those we need and also those for which we feel affected.
From here, the ransomware presents a message on the screen warning of the fact. Sometimes, he directly declares his pernicious nature of malware, but sometimes he also masquerades as something different, such as a software police or a ministry that indicates that child pornography has been discovered in the computer, or some other illegal content, and advises of the encryption until a fine is paid.
Needless to say, this warning is totally false.
What to do to avoid falling into its clutches
First of all, do not open anything that comes to us by email, which should be a rule applied by the system for a long time.
Also have a good total defense anti-malware tool (let's forget the old concept of antivirus; the Informatic security today it requires being protected on all fronts) and keeping it updated.
Do not be too trusting in the case that we use an "alternative" platform such as Mac OS X or GNU / Linux; There are copies of ransomware also for these systems, as well as for Android, so we better be very careful ...
For the case that, despite all the measures of safety, let's fall victim to one of these software gimmicks, it is best to have backup copies (backup) recently made of our data, with which we can recover them without further problem.
The different ransomware that are in circulation use a simple encryption that has been solved and, for therefore, it has been possible to provide a vaccine, even strong encryption that, for the moment, is invulnerable.
So it would be nice if we never let our guard down or relax in the defense of our computer systems.
What to do if we become victims
First of all, NEVER pay the required amount; It is likely that it will not help us since, either the cybercriminals are not going to give us the correct password, or then they will demand another amount from us with any excuse.
In addition, once the required quantity has been supplied, who tells us that the pathogen is not going to remain latent in our system to return to its old ways after a few months or a year?
Once we have been infected once, we could be victims of new outbreaks. Will we always have to pay?
We should also report the facts to the police, since the clues they can draw may be determining factors in a trial if the guilty are found and arrested, something that, however, is little probable.
Photos: Fotolia - Rawpixel / lulu
Topics in Ransomware